First published: Mon Aug 20 2018(Updated: )
Rust Programming Language Rust standard library version Commit bfa0e1f58acf1c28d500c34ed258f09ae021893e and later; stable release 1.3.0 and later contains a Buffer Overflow vulnerability in std::collections::vec_deque::VecDeque::reserve() function that can result in Arbitrary code execution, but no proof-of-concept exploit is currently published.. This vulnerability appears to have been fixed in after commit fdfafb510b1a38f727e920dccbeeb638d39a8e60; stable release 1.22.0 and later.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | >=1.3.0<1.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000657 is a vulnerability in the Rust Programming Language Rust standard library that allows for arbitrary code execution.
CVE-2018-1000657 has a severity rating of 7.8, which is considered high.
CVE-2018-1000657 affects Rust programming language versions Commit bfa0e1f58acf1c28d500c34ed258f09ae021893e and later, as well as stable release 1.3.0 and later.
To fix CVE-2018-1000657, users should update their Rust programming language to a version that includes the necessary patch for the vulnerability.
You can find more information about CVE-2018-1000657 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/105188), [GitHub Commit](https://github.com/rust-lang/rust/commit/f71b37bc28326e272a37b938e835d4f99113eec2), [GitHub Issue](https://github.com/rust-lang/rust/issues/44800).